Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
28-07-2024 21:56
Static task
static1
Behavioral task
behavioral1
Sample
2659ed2cb4afab7a842b055f23ffd340_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2659ed2cb4afab7a842b055f23ffd340_JaffaCakes118.dll
Resource
win10v2004-20240730-en
General
-
Target
2659ed2cb4afab7a842b055f23ffd340_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
2659ed2cb4afab7a842b055f23ffd340
-
SHA1
509080204bd698f75f5096799f1bc7c13ecf79d9
-
SHA256
26d370fac05289d2d7895acb5ab970e500769b0fff27e5807a0edf36a662926f
-
SHA512
5819c6ffcd8b7ae10b2d7f5694eff3d1d19645273ae29d161e0a6ab975fa33b8d75268292c5d257c77172202afa38179127d46d1592c9ff7667523acc2186a1e
-
SSDEEP
24576:euYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9N:e9cKrUqZWLAcU
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3448-4-0x0000000002930000-0x0000000002931000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 3136 MoUsoCoreWorker.exe 1136 dialer.exe 1924 Magnify.exe -
Loads dropped DLL 3 IoCs
pid Process 3136 MoUsoCoreWorker.exe 1136 dialer.exe 1924 Magnify.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2077438316-259605770-1264560426-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pjlpxjignwwhtsp = "C:\\Users\\Admin\\AppData\\Roaming\\Sun\\Java\\5KN\\dialer.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MoUsoCoreWorker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dialer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2836 regsvr32.exe 2836 regsvr32.exe 2836 regsvr32.exe 2836 regsvr32.exe 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found 3448 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3448 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3448 wrote to memory of 560 3448 Process not Found 84 PID 3448 wrote to memory of 560 3448 Process not Found 84 PID 3448 wrote to memory of 3136 3448 Process not Found 85 PID 3448 wrote to memory of 3136 3448 Process not Found 85 PID 3448 wrote to memory of 716 3448 Process not Found 86 PID 3448 wrote to memory of 716 3448 Process not Found 86 PID 3448 wrote to memory of 1136 3448 Process not Found 87 PID 3448 wrote to memory of 1136 3448 Process not Found 87 PID 3448 wrote to memory of 2772 3448 Process not Found 88 PID 3448 wrote to memory of 2772 3448 Process not Found 88 PID 3448 wrote to memory of 1924 3448 Process not Found 89 PID 3448 wrote to memory of 1924 3448 Process not Found 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\2659ed2cb4afab7a842b055f23ffd340_JaffaCakes118.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2836
-
C:\Windows\system32\MoUsoCoreWorker.exeC:\Windows\system32\MoUsoCoreWorker.exe1⤵PID:560
-
C:\Users\Admin\AppData\Local\MkfVeO\MoUsoCoreWorker.exeC:\Users\Admin\AppData\Local\MkfVeO\MoUsoCoreWorker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3136
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe1⤵PID:716
-
C:\Users\Admin\AppData\Local\rVmu\dialer.exeC:\Users\Admin\AppData\Local\rVmu\dialer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1136
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵PID:2772
-
C:\Users\Admin\AppData\Local\iFS\Magnify.exeC:\Users\Admin\AppData\Local\iFS\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1924
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD547c6b45ff22b73caf40bb29392386ce3
SHA17e29a8d98fbb9b02d3d22e3576f4fd61ab50ffe9
SHA256cbccb642725edb42e749e26ded68a16b3aa20e291a1a7793a2d4efebb75f99c0
SHA512c919ab84a497616e7969d58c251f4e6efc337b41ef6956864b86d66ae1437294c124232fec54433eab3a6518ed529f8445dd0b23706b2f42f3fa42e69711f331
-
Filesize
1.2MB
MD541791ebccdfd5fac1e23897311a29574
SHA1705f2b243d33753b521d927491b535482fe5f8c6
SHA25625c934bbb510c0511c2bc8de914f799af1aca0b324911f9d74e7f8871754c4ca
SHA512efe39208d33a1f2dd72e3a711b949e88fdd556359f8fb3216f128ffcd005db047cb1055764f001d952532ab9a7f081237921ba96b59ca088cd5985579f9abaa1
-
Filesize
1.2MB
MD5b4db1dcc915a8059a88642ea392e7723
SHA16b42ad6b2559be3ea85d076b70a2bca5b934ec32
SHA256ccbe7ee0b332677be2022128d8379613134bce88b41538ba4b4126280f228a60
SHA51242612a7c7c1b575b6257178e93ea73402a028f92327c9d4360d13e95f352dd77b07e2fe0ae97e727a18506bad10dd655860d2db2fe00c2c0f7fc8f4ba2777d01
-
Filesize
639KB
MD54029890c147e3b4c6f41dfb5f9834d42
SHA110d08b3f6dabe8171ca2dd52e5737e3402951c75
SHA25657137f784594793dc0669042ccd3a71ddbfedeb77da6d97173d82613e08add4d
SHA512dbdc60f8692f13c23dbed0b76e9c6758a5b413bd6aaf4e4d0ba74e69c0871eb759da95c3f85a31d972388b545dcf3bb8abbcbedd29a1e7e48c065130b98b893d
-
Filesize
1.2MB
MD54cf73609a7e3aa8a1d635c9f2a2ccc88
SHA11630ccfb3e0cb4e23066c26316364ecc12489907
SHA25678ecb0f6f43a757974caf0d9e21a5a0a8244cbaa9c37b4fd440899308a312fb9
SHA512552412dfc85a69493cbd2646675441697ed7d41f6a5dd8f504869a0e2c4d56b42dcf875317aa70a6517d8776b69c178f9c284f6a968a917283a9d54bce025e1c
-
Filesize
39KB
MD5b2626bdcf079c6516fc016ac5646df93
SHA1838268205bd97d62a31094d53643c356ea7848a6
SHA256e3ac5e6196f3a98c1946d85c653866c318bb2a86dd865deffa7b52f665d699bb
SHA512615cfe1f91b895513c687906bf3439ca352afcadd3b73f950af0a3b5fb1b358168a7a25a6796407b212fde5f803dd880bcdc350d8bac7e7594090d37ce259971
-
Filesize
1KB
MD5a3bb24a2770704f1d92d91723e95b01a
SHA11c3b056e5422d683387dc1e9af2523fd8fcde1b1
SHA25695345f34c70336d67f1b13a790c59ab38028ecae6ac2a40ee94d519e57a55794
SHA5121732d4eda37130f742b16b6f71832a6a904badba60a318b7e21e2bb0411bc36c16efd5632ecfd56397a4c1aa7169d35a4ce9900075fcd6417ff9fed47caa189d